Anton Shipulin's starred repositories
ransomwatch
the transparent ransomware claim tracker 🥷🏼🧅🖥️
icscybertn
NZ ICS Cyber Technical Network artefacts
PLC_and_RTU_Simulator
The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functionalities of two common industrial automation OT (Operational Technology ) devices: PLCs (Programmable Logic Controllers) and RTUs (Remote Terminal Units).
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
Red-Teaming-TTPs
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Ninja_C2_Malware_Simulation_System
The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically develop and deploy various types of cyber attacks.
vulnrichment
A repo to conduct vulnerability enrichment.
iec62443-svv-demo
A project to explore automation of security verification and validation in IEC-62443-4-1
ICS-OT_wireshark_profiles
ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles
Railway_Control-OT-Cyber-Attack
We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer monitoring HMI and the Lecturer training HMI) to control the system. We also want to use this system to demo different kinds of PLC OT-Cyber attack by implementing the related attack simulation function.
OT_ICS_ressource_list
My personal OT resource list, gather throughout research and internet adventure.
Railway_Control-OT-Cyber-Attack
We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer monitoring HMI and the Lecturer training HMI) to control the system. We also want to use this system to demo different kinds of PLC OT-Cyber attack by implementing the related attack simulation function.
llm-course
Course to get into Large Language Models (LLMs) with roadmaps and Colab notebooks.
owasp-istg
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
awesome-sbom
A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles
Secure_PLC_Coding
Documentation and guidance to practice secure coding for various PLC vendors
IACS_STAR_Methodology
A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.